Information Security Practice and Experience

8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings

  • Mark D. Ryan
  • Ben Smyth
  • Guilin Wang
Conference proceedings ISPEC 2012

DOI: 10.1007/978-3-642-29101-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7232)

Table of contents (27 papers)

  1. Front Matter
  2. Digital Signatures

    1. A Pre-computable Signature Scheme with Efficient Verification for RFID
      Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 1-16
    2. Redactable Signatures for Independent Removal of Structure and Content
      Kai Samelin, Henrich C. Pöhls, Arne Bilzhause, Joachim Posegga, Hermann de Meer
      Pages 17-33
  3. Public Key Cryptography

    1. Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring
      Xianhui Lu, Bao Li, Qixiang Mei, Yamin Liu
      Pages 34-45
    2. Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack
      Chong-zhi Gao, Dongqing Xie, Baodian Wei
      Pages 46-62
    3. Computational Soundness of Indistinguishability Properties without Computable Parsing
      Hubert Comon-Lundh, Masami Hagiya, Yusuke Kawamoto, Hideki Sakurada
      Pages 63-79
  4. Cryptanalysis I: Differential Attacks

    1. New Impossible Differential Attacks on Camellia
      Dongxia Bai, Leibo Li
      Pages 80-96
    2. Impossible Differential Attacks on Reduced-Round LBlock
      Ya Liu, Dawu Gu, Zhiqiang Liu, Wei Li
      Pages 97-108
    3. New Truncated Differential Cryptanalysis on 3D Block Cipher
      Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
      Pages 109-125
  5. Applications I.i: Oblivious Transfer

    1. A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions
      Preetha Mathew K., Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
      Pages 144-157
  6. Applications I.ii: Internet Security (Works-in-Progress)

    1. Towards Fine-Grained Access Control on Browser Extensions
      Lei Wang, Ji Xiang, Jiwu Jing, Lingchen Zhang
      Pages 158-169
    2. Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family
      Yang-Wai Chow, Willy Susilo
      Pages 170-181
  7. Key Management

    1. High-Entropy Visual Identification for Touch Screen Devices
      Nathaniel Wesley Filardo, Giuseppe Ateniese
      Pages 182-198
    2. A Framework for Security Analysis of Key Derivation Functions
      Chuah Chai Wen, Edward Dawson, Juan Manuel González Nieto, Leonie Simpson
      Pages 199-216
  8. Applied Cryptography

    1. On the Equivalence of Two Definitions of Visual Cryptography Scheme
      Teng Guo, Feng Liu, ChuanKun Wu
      Pages 217-227
    2. Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing
      Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi
      Pages 228-244
    3. Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks
      Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote
      Pages 245-258
  9. Applications II.i: PINs

    1. iPIN and mTAN for Secure eID Applications
      Johannes Braun, Moritz Horsch, Alexander Wiesmaier
      Pages 259-276
  10. Applications II.ii: Fundamentals (Works-in-Progress)

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 8th International Conference on Information Security Practice and Experience, ISPEC 2012, held in Hangzhou, China, in April 2012.
The 20 revised full papers presented together with 7 work-in-progress papers were carefully reviewed and selected from 109 submissions. The papers are oranized in topical sections on digital signatures, public key cryptography, cryptanalysis, differential attacks, oblivious transfer, internet security, key management, applied cryptography, pins, fundamentals, fault attacks, and key recovery.

Keywords

CAPTCHA impossible differential attack linear cryptanalysis oblivious transfer visual cryptography

Editors and affiliations

  • Mark D. Ryan
    • 1
  • Ben Smyth
    • 2
  • Guilin Wang
    • 3
  1. 1.School of Computer ScienceUniversity of BirminghamUK
  2. 2.Toshiba CorporationSaiwai-kuJapan
  3. 3.School of Computer Science & Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-29100-5
  • Online ISBN 978-3-642-29101-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349